Netgear WNAP210 WNAP210 Reference Manual - Page 25

Restrict access based on MAC address, Turn off the broadcast of the wireless network name SSID - wireless n access point

Page 25 highlights

ProSafe Wireless-N Access Point WNAP210 Reference Manual Figure 2-1 There are several ways you can enhance the security of your wireless network: • Restrict access based on MAC address. You can restrict access to only trusted PCs so that unknown PCs cannot wirelessly connect to the access point. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. • Turn off the broadcast of the wireless network name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network "discovery" feature of some products such as Windows XP, but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers. • Use WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP open authentication and WEP data encryption will block all but the most determined eavesdropper. • Use WPA or WPA-PSK. Wi-Fi Protected Access (WPA) data encryption provides data security. The very strong authentication along with dynamic per frame rekeying of WPA make it virtually impossible to compromise. Because this is a new standard, wireless device driver and software availability might be limited. Note: WEP and TKIP provide only legacy (slower) rates of operation. AES encryption is recommended in order to use the 11n rates and speed. See Table 2-1 on page 2-23. Installation and Configuration 2-3 v1.0 March 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126

ProSafe Wireless-N Access Point WNAP210 Reference Manual
Installation and Configuration
2-3
v1.0 March 2009
Figure 2-1
There are several ways you can enhance the security of your wireless network:
Restrict access based on MAC address
. You can restrict access to only trusted PCs so that
unknown PCs cannot wirelessly connect to the access point. MAC address filtering adds an
obstacle against unwanted access to your network, but the data broadcast over the wireless link
is fully exposed.
Turn off the broadcast of the wireless network name (SSID)
. If you disable broadcast of the
SSID, only devices that have the correct SSID can connect. This nullifies the wireless network
“discovery” feature of some products such as Windows XP, but the data is still fully exposed
to a determined snoop using specialized test equipment like wireless sniffers.
Use WEP
. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
open authentication and WEP data encryption will block all but the most determined
eavesdropper.
Use WPA or WPA-PSK
. Wi-Fi Protected Access (WPA) data encryption provides data
security. The very strong authentication along with dynamic per frame rekeying of WPA make
it virtually impossible to compromise. Because this is a new standard, wireless device driver
and software availability might be limited.
Note:
WEP and TKIP provide only legacy (slower) rates of operation. AES
encryption is recommended in order to use the 11n rates and speed. See
Table 2-1 on page 2-23
.